Hackers have uncovered a simple flaw in Apple products
“Image files are an excellent vector for attacks since they can be easily distributed over web or email traffic without raising the suspicion of the recipient”, Cisco Talos wrote in a blog post this week. The latest version of OS X is El Capitan 10.11.6, and it is compatible with most Mac laptops and desktops dating back to mid-2007.
Security vulnerabilities that can allow hackers to access your device by sending you an iMessage are found in nearly every version of iOS and OS X, except the latest ones, report Forbes and Quartz.
While iPhones can render the image normally, by tampering with a file a hacker could overload the device’s memory allowing the image to execute malicious codes.
The exploit can also be achieved without any direct user interaction, such as by iMessages which are automatically rendered on a device on arrival.
Image formats that can be used to exploit these vulnerabilities are tiff (tagged image file format), bmp (bitmap), dae (digital asset exchange), and OpenEXR. Updating to OS X 10.11.6 and iOS 9.3.3 addresses the issue, and Security Update 2016-004 patches the flaw for OS X Mavericks 10.9.5 and OS X Yosemite 10.10.5.
Last year’s Stagefright vulnerability, which could let someone control your Android phone with just a text, was a terrifying security hole that affected 95 percent of all Android devices.
To do this, simply got to general/software updates on your IOS device, and follow the prompts. That would mean, about 97 million devices are vulnerable to an attack.
Apple has fixed the bug, but only for iOS and Mac users who update to the latest software.
The good news is that the issue seems to have been patched.
If you’re an iPhone owner, you need iOS 9.3.3 right freakin’ now.
Marc Laliberte, information security threat analyst of WatchGuard Technologies, says that several updates involved situations where Apple has discovered more related vulnerabilities as a vulnerabilities report that is disclosed by the external researchers.